SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    Re: iSCSI - started countdown to 12 (11-95)





    The last I have heard is that IPS-IPsec stays informational and the normative text is in the main draft.

    Thanks for the typo.

    Regards,
    Julo


    "Michael J. S. Smith \(RoadRunner\)" <smithm007@hawaii.rr.com>
    Sent by: owner-ips@ece.cmu.edu

    04/14/2002 01:50 AM
    Please respond to "Michael J. S. Smith \(RoadRunner\)"

           
            To:        <ips@ece.cmu.edu>
            cc:        <msmith@iready.com>
            Subject:        Re: iSCSI - started countdown to 12 (11-95)

           


    Julo: This is a really silly one, but I accidentally found a
    typographical error while reading 11-95, section 7.3.1:

    An iSCSI compliant initiator or target MUST provide data integrity and
    authentication by implementing IPsec [RFC2401] with ESP in tunnel mode
    [RFC2406] and MAY provide data provide data integrity and authen-
    tication by implementing IPsec with ESP in transport mode. The IPsec
    implementation MUST fulfill the following iSCSI specific require- ments:

    "provide data provide data" -> "provide data"

    I wouldn't normally waste bandwidth on this, but there's an interesting
    discussion going on over in the SNIA snia-ips forum on iSCSI IPsec APIs
    (which does not belong here) and while digging around 11-95 I noticed
    the above. Anyway, during the discussion, while Bernard was pointing out
    some of the wording in the ips-security draft, it occured to me that I
    needed to ask David (and Julo and Bernard, I guess) the following
    procedural question:

    David, Julo, and Bernard: do we, and if so, how do we ensure that the
    iSCSI Internet draft and ips-security drafts are true to each other?

    The ambiguity in using the phrase "true to each other" was deliberate,
    how do these things normally work, David? Does the ips-security draft
    lapse or does it become informational or do we just keep leapfrogging or
    what (I did read RFC1796 and RFC2026)? As a small concrete example, how
    do we cover the things going on in AES counter mode in saag and the OCB
    and CCM work in 802.11 TGi? Do we expect to update the iscsi draft, the
    ips-security draft, or both, or neither?

    Aloha
    Mike Smith
    CTO, iReady
    (I'm currently in Hawaii, ignore my email address, reply to
    msmith@iready.com)
    Encoding: Western European (ISO), apologies for those expecting plain
    ASCII.

    ----- Original Message -----
    From: "Julian Satran" <Julian_Satran@il.ibm.com>
    To: <ips@ece.cmu.edu>
    Sent: Saturday, April 13, 2002 2:58 AM
    Subject: iSCSI - started countdown to 12 (11-95)


    > Dear colleagues,
    >
    > I've put on my site (http://www.haifa.il.ibm.com/satran/ips) a
    "working" version of the draft labeled 11-95
    > Only the pdf version (with change bars vs. 11) is available.
    > It contains all the agreed changes + a MUST requirement for the
    initiator
    > to fully deliver data on R2T and
    > unsolicited data-out (thanks Ralph Weber for the convincing
    arguments).
    > security - tunnel MUST transport MAY  and authenticate when encrypting
    > the normative naming text
    > the last version of the clearing effects appendix
    > removed CRN
    > an implementer note about TPGT usage and discovery
    > unsolicited data - if not immediate or none must be of FirstBufSize or
    > Total Data (I am not sure we should allow immediate but I see no real
    > harm).
    > references are split -
    > minor corrections in text and AE data has now the same format as
    response
    >
    > Julo
    >
    >
    >
    >
    >
    >

    >
    >
    >
    >
    >
    >
    >
    >








Home

Last updated: Sun Apr 14 01:18:23 2002
9658 messages in chronological order